Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Using Video Management Systems for Effective Investigations

By Bill Zalud
Security Officer Looking at multiple video screens
Security camera
High-definition and megapixel cameras encourage the application of video management software that is more sophisticated to handle security and other business needs.
Security at JCPenney
Live monitoring is one of three functions of a video management system. The other two: taking action on alarms and forensics or review of recorded video.
Security Officer Looking at multiple video screens
Security camera
Security at JCPenney
July 1, 2012

It’s a matter of flexibility, contends Colin Adderley. Bryant Garrett adds integration and scalability, in addition to flexibility, to his needs. For Robert Knell, it’s the perfect bundle: a system providing a wide spectrum of features, granular configuration options, creating a highly flexible and customizable solution.

It’s video management software or VMS, the heart of a growing number of enterprise and government security systems. Current and emerging VMS approaches incorporate more intelligence into their design, including video analytics and the ability to interface with life safety and access control systems. With advancement of high-definition video, megapixel cameras and IP infrastructures, VMS is evolving to be more than just a security solution.

Basically, a VMS receives video from cameras and allows someone to view that video either live or recorded. There are three main functions. First is live monitoring, which accounts for less of uses these days but still important. The second is the ability to react to alarms or events, which can be triggered by something as simple as a motion detector or input from an access control system. The third is the use of VMS as an investigation tool – forensics – to figure out what has happened.

 

Consider Expansion

A VMS provides a cost-effective way to continually upgrade and expand solutions without having to completely rip out an old system. It can also act as a video enabler for other security and business systems. A VMS is also a way to bring down costs by incorporating more components into an overall solution.

With forensics, there is equally more VMS focus on tools such as search, synopsis and metadata. Now that VMS platforms are being recognized as the real “brain” of systems, emphasis shifts to interfaces and experiences like centralized control with local access options, automatic device discovery, flexible administrative rules, intuitive navigation for different skill levels and more.

One example: The City of Calgary’s light rail transit system called CTrain employs Genetec’s Omnicast video surveillance platform to keep passengers safe. “One of the major advantages of choosing Omnicast is its flexibility,” says Adderley, project manager and engineer for the city. “The flexibility in architectural design of the system has allowed us to minimize single points of failure along all portions of the system. And the open architecture allows us to use our ‘flavor of the day’ cameras to accommodate vendor competition through different product life cycles. Plus, the whole system is cheaper on a per-camera basis so we can maximize our coverage with allocated funds.”

 

Moving Beyond Legacy Gear

When CTrain was first built, a security video system was installed comprising a matrix of analog cameras transmitting analog video to tapes, and eventually digital video recorders, which processed and archived the footage.

In searching for a suitable replacement, several qualities were paramount. Calgary needed an open platform system to maximize flexibility under strict procurement models, as well as a mature and proven piece of software that could easily integrate with their large monitor wall and run across multiple work stations. The CTrain also required a multitude of software configuration options and the ability to easily scale the system as needed based on the addition of new transit stations to the CTrain’s constantly growing lines.

An IP solution was deemed most suitable, providing reduced infrastructure costs for a system that would be spread across a number of physical locations (i.e., stations), as well as increased system security. An added benefit would be the creation of a robust network. This would not only house the security platform, but also facilitate an evolution in the transit organization. The network would provide a technologically advanced backbone on which all aspects of the CTrain’s management could rely and interplay smoothly.

 

System Integration, Too

The Omnicast platform integrates with a number of other systems to streamline the CTrain’s operations.

Active Directory is integrated to efficiently manage administration and organization of user profiles; SNMP (simple network management protocol) monitoring is also enabled, to provide an extra layer of reliability by alerting both operators and the integrator if any network connected device experiences a fault or performance issue. Most importantly, Omnicast has been integrated with the CTrain’s supervisory control and data acquisition) system. The SCADA system controls operator interaction with various events, often mechanical, including movement of elevators and escalators, and response to station help phones. Integration means that the SCADA system will drive alerts or requests via a serial to digital interface to the videowall and operator.

With years of experience in airport security, Garrett, CFO and chief of the Orlando Sanford International Airport (SFB) Police Department, had specific requirements. First, he wanted a video management system that would be integrative, scalable and flexible: “A non-proprietary system would allow [us] to get competitive bids from multiple hardware vendors.” Additionally, he wanted to be able to have a multiple camera screen presentation and the functionality to manipulate PTZ cameras. Most importantly, he wanted to be able to quickly switch from live to archived videos and easily export selections of archived videos in high quality format for other authorities to review from another monitoring station.

SFB decided to begin its analog-to-digital security conversion with the 150 cameras that were already in place and added another 80 cameras. Using existing fiber optic cable, the integrator, SiteSecure, built a dedicated IP video network. With this new IP infrastructure, Omnicast’s open architecture enabled SFB to both keep and choose their preferred server and hardware, and additionally gave them a very scalable solution which they could grow very easily.

 

Live Monitoring

Dispatchers monitor Sanford Airport from a remote control center. Furthermore, the intuitive drag-and-drop user interface proved popular with SFB’s personnel who found it to be simple and uncomplicated.

When the security center installation was complete, the police department in Watertown, Mass., had a system tying into 42 video cameras and 72 access controlled points. Officer Knell, systems administrator, says that implementation went “very well – a lot better than we were expecting. We had none of the issues we’ve had with other vendors, and any minor changes, such as camera angle adjustments, have been handled speedily by Signet Electronic Systems,” the integrator.

Watertown’s police department uses Bosch and Axis cameras, Genetec’s unified security platform, Security Center, which unifies Omnicast video surveillance and Synergis access control systems all in one solution.

Watertown PD is monitored 24/7, with video feeds used for real-time surveillance of prisoners as well as other spot monitoring. The prisoner and interview room feeds are burned directly to disk for indefinite archiving. All other video archives are kept for investigative purposes for a minimum of 30 days via a two terabyte storage system. There are plans to increase the storage capacity to extend past 30 days in the near future.

KEYWORDS: video feeds for security video management video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • IntelligenceVideo

    Using Intelligent Video to Solve Investigations

    See More
  • SEC0819-VMS-Feat-slide1_900px

    Video Management Systems for Your Security Enterprise

    See More
  • surveillance-room freepik

    Advanced technology applications drive new opportunities for video management systems

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×
High-definition and megapixel cameras encourage the application of video management software that is more sophisticated to handle security and other business needs.
Live monitoring is one of three functions of a video management system. The other two: taking action on alarms and forensics or review of recorded video.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!